| |
Goals: Confidentiality
- Access to information or resources only to authorized users/entities/persons.
- Mechanism:
- Access Control List (ACL) or Access control specifications
- Data encryption
- Must have a mechanism to authenticate
- Password, Cryptographic techniques
- Some time necessary to even conceal the fact that the information exist.
- Access control on directories, Steganography
Goals: Integrity
- “Can I trust the information?”
- Data integrity to ensure that the data is genuine and is not modified
- Some time need to ensure that data originated from the right place
- Mechanism
- Cryptographic techniques
- Hashing techniques
- Checksums and use of alternate channels to send them.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
|
|